First published: Mon Oct 26 2015(Updated: )
Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Client | >=9.3.0<9.3.10 | |
PostgreSQL Client | >=9.4.0<9.4.5 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5289 is classified as a high severity vulnerability due to its ability to cause a denial of service by crashing the server.
To fix CVE-2015-5289, upgrade PostgreSQL to version 9.3.10 or later for the 9.3.x series or version 9.4.5 or later for the 9.4.x series.
Exploiting CVE-2015-5289 allows attackers to trigger stack-based buffer overflows leading to server crashes, resulting in service disruption.
CVE-2015-5289 affects PostgreSQL versions prior to 9.3.10 and 9.4.5.
Yes, CVE-2015-5289 involves multiple stack-based buffer overflows specifically in the JSON parsing functionality of PostgreSQL.